- 5 Résultats
prix le plus bas: € 48,45, prix le plus élevé: € 69,91, prix moyen: € 56,59
1
Security Technology : International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings - Dominik Slezak
Commander
sur ZVAB.com
€ 52,96
Envoi: € 0,001
CommanderLien sponsorisé
Dominik Slezak:

Security Technology : International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings - Livres de poche

2009, ISBN: 3642108466

[EAN: 9783642108464], Neubuch, [SC: 0.0], [PU: Springer Berlin Heidelberg], DATENSICHERHEIT; DATENSICHERUNG; SICHERHEIT / BITTORRENT; BROADCAST; CODE; MIMO; PARTITION; AUTHENTICATION; BEH… Plus…

NEW BOOK. Frais d'envoiVersandkostenfrei. (EUR 0.00) AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)]
2
Security Technology : International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings - Dominik Slezak
Commander
sur ZVAB.com
CHF 55,48
(environ € 58,12)
Envoi: € 18,131
CommanderLien sponsorisé

Dominik Slezak:

Security Technology : International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings - Livres de poche

2009, ISBN: 3642108466

[EAN: 9783642108464], Neubuch, [SC: 18.13], [PU: Springer Berlin Heidelberg], DATENSICHERHEIT; DATENSICHERUNG; SICHERHEIT / BITTORRENT; BROADCAST; CODE; MIMO; PARTITION; AUTHENTICATION; B… Plus…

NEW BOOK. Frais d'envoi EUR 18.13 AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)]
3
Security Technology, Kartoniert (TB)
Commander
sur Weltbild.de
€ 53,49
Envoi: € 0,001
CommanderLien sponsorisé
Security Technology, Kartoniert (TB) - nouveau livre

2009

ISBN: 3642108466

As future generation information technology (FGIT) becomes specialized and fr- mented, it is easy to lose sight that many topics in FGIT have common threads and, because of this, advances… Plus…

Nr. 22424477. Frais d'envoi, 2-5 Werktage, DE. (EUR 0.00)
4
Security Technology - Slezak, Dominik Kim, Tai-Hoon Fang, Wai Chi Arnett, Kirk P.
Commander
sur booklooker.de
€ 48,45
Envoi: € 0,001
CommanderLien sponsorisé
Slezak, Dominik Kim, Tai-Hoon Fang, Wai Chi Arnett, Kirk P.:
Security Technology - Première édition

2009, ISBN: 9783642108464

Livres de poche

[ED: Kartoniert / Broschiert], [PU: Springer Berlin Heidelberg], Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. As future generation info… Plus…

Frais d'envoiVersandkostenfrei, Versand nach Deutschland. (EUR 0.00) Moluna GmbH
5
Commander
sur Biblio.co.uk
$ 75,36
(environ € 69,91)
Envoi: € 11,961
CommanderLien sponsorisé
Slezak, Dominik (Editor):
Security Technology: International Conference, Sectech 2009, Held As Part of the Future Generation Information Technology Conference, Fgit 2009, Jeju Island, Korea, Decemb - Livres de poche

2009, ISBN: 9783642108464

Springer-Verlag New York Inc, 2009. Paperback. New. 1st edition. 308 pages. 9.00x6.00x0.50 inches., Springer-Verlag New York Inc, 2009, 6

Frais d'envoi EUR 11.96 Revaluation Books

1Comme certaines plateformes ne transmettent pas les conditions d'expédition et que celles-ci peuvent dépendre du pays de livraison, du prix d'achat, du poids et de la taille de l'article, d'une éventuelle adhésion de la plateforme, d'une livraison directe par la plateforme ou via un prestataire tiers (Marketplace), etc. il est possible que les frais de livraison indiqués par eurolivre ne correspondent pas à ceux de la plateforme qui propose l'article.

Données bibliographiques du meilleur livre correspondant

Détails sur le livre
Security Technology

This volume constitutes the selected papers of the International Conference on Security Technology, SecTech 2009, held as part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, in December 2009.

Informations détaillées sur le livre - Security Technology


EAN (ISBN-13): 9783642108464
ISBN (ISBN-10): 3642108466
Version reliée
Livre de poche
Date de parution: 2009
Editeur: Springer Berlin Heidelberg
308 Pages
Poids: 0,488 kg
Langue: eng/Englisch

Livre dans la base de données depuis 2009-10-17T03:06:56+02:00 (Zurich)
Page de détail modifiée en dernier sur 2024-04-04T20:07:14+02:00 (Zurich)
ISBN/EAN: 9783642108464

ISBN - Autres types d'écriture:
3-642-10846-6, 978-3-642-10846-4
Autres types d'écriture et termes associés:
Auteur du livre: slezak, tai, fang, dominik, kim chi, arnett
Titre du livre: security 2009, joaquin sorolla, proceedings the, generation, island, science and information technology, science korea technology, science and technology and the future


Données de l'éditeur

Auteur: Dominik Slezak
Titre: Communications in Computer and Information Science; Security Technology - International Conference, SecTech 2009, Held as Part of the Future Generation Information Technology Conference, FGIT 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings
Editeur: Springer; Springer Berlin
308 Pages
Date de parution: 2009-11-24
Berlin; Heidelberg; DE
Langue: Anglais
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIII, 308 p.

BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; BitTorrent; Broadcast; Code; MIMO; Partition; authentication; behavior models; communication; cryptography; malvare detection; metrics; privacy; signatures; urban computing; wireless sensors; Cryptology; Computer Communication Networks; Data Structures and Information Theory; Coding and Information Theory; Discrete Mathematics in Computer Science; Computer Engineering and Networks; Kryptografie, Verschlüsselungstechnologie; Netzwerk-Hardware; Algorithmen und Datenstrukturen; Informationstheorie; Mathematik für Informatiker; Diskrete Mathematik; Computerhardware; EA

Applications of Reversible Data Hiding Techniques with the Quick Response Codes.- A New Approach in T-FA Authentication with OTP Using Mobile Phone.- Correlating Alerts into Compressed Graphs Using an Attribute-Based Method and Time Windows.- A Study on Secure Contents Using in Urban Computing.- Shadow Generation Protocol in Linguistic Threshold Schemes.- Analysis of Handwritten Signature Image.- The Design of Signature Selection for Protecting Illegal Outflow of Sensitive Information in Mobile Device.- Hardware Based Data Inspection for USB Data Leakage Prevention.- Grayscale Image Classification Using Supervised Chromosome Clustering.- Towards the Integration of Security Aspects into System Development Using Collaboration-Oriented Models.- Impact of Malicious Node on Broadcast Schemes.- Hierarchical Identity-Based Identification Schemes.- The Trend of the Security Research for the Insider Cyber Threat.- MIMO Wiretap Channel: A Scalar Approach.- Security Testing for Operating System and Its System Calls.- Efficient Group Signature with Forward Secure Revocation.- Detecting Distributed Denial of Service Attack Based on Multi-feature Fusion.- Researching on Cryptographic Algorithm Recognition Based on Static Characteristic-Code.- Verification of Security-Relevant Behavior Model and Security Policy for Model-Carrying Code.- Feature Level Fusion of Biometrics Cues: Human Identification with Doddington’s Caricature.- A Study on the Interworking for SIP-Based Secure VoIP Communication with Security Protocols in the Heterogeneous Network.- DDoS Attack Detection Using Three-State Partition Based on Flow Interaction.- A Development of Finite State Machine Create Tool for Cryptography Module Validation.- A Privacy-Aware System Using Threat-Based Evaluation and Feedback Methodin Untrusted Ubiquitous Environments.- Fusion of Multiple Matchers Using SVM for Offline Signature Identification.- A Two-Factor Mutual Authentication Scheme Using Biometrics and Smart Card.- Secure Collection Tree Protocol for Tamper-Resistant Wireless Sensors.- Accelerometer Based Digital Video Stabilization for Security Surveillance Systems.- Escrowed Deniable Identification Schemes.- Insights into Malware Detection and Prevention on Mobile Phones.- Automation of Post-exploitation.- Speaker Dependent Frequency Cepstrum Coefficients.- Towards the Detection of Encrypted BitTorrent Traffic through Deep Packet Inspection.- A Simple Encryption Scheme for Binary Elliptic Curves.- Analysis of Text Complexity in a Crypto System – A Case Study on Telugu.- Symmetric-Key Encryption for Wireless Internet SCADA.- An Efficient Pre-filtering Mechanism for Parallel Intrusion Detection Based on Many-Core GPU.

Autres livres qui pourraient ressembler au livre recherché:

Dernier livre similaire:
9781450320863 Cikm12 Proceedings of the 21st ACM International Conference on Information and Knowledge Management V3 Cikm 12 Conference Committee Author (Cikm 12 Conference Committee)


< pour archiver...